An Invasion of Privacy? | Introduction | Background | Potential Benefits | Legal and Ethical Issues | Security Concerns | Social Problems | Conclusion | Bibliography |
"By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code . I am fully aware of the following sections of the Honor Code: Understanding the Honor Code, Understanding the Consequences. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 web site."